1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
2 years ago
14

What is a man-in-the-middle attack​

Computers and Technology
2 answers:
VMariaS [17]2 years ago
4 0

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

Klio2033 [76]2 years ago
3 0

Answer:

a  warrior

Explanation:

You might be interested in
These are statements given by witnesses under oath? A. Testimony B. Admissible Evidence C. Indirect Evidence D. Circumstantial E
Aneli [31]

Answer:A. Testimony

Explanation:when someone knows something about what happened in the case held in court or they had witnessed what happened; In order to actual testify on what they know they are called on the stand and they have to raise their hand as a sign to swear an oath before the can give their testimony in court.

8 0
2 years ago
You can add additional design elements to a picture by adding a color background, which is accomplished by using what Paint feat
katrin2010 [14]

Answer:

Fill with Color tool

6 0
3 years ago
Six security issues and six descriptions are shown below.
Trava [24]

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question contains six securities terms and definitions.

The goal of this question is to properly map the term to its correct description/definition.

You can find the complete mapping in the attached image.

7 0
2 years ago
Which type of software is created on user dimension​
Ratling [72]

Answer:

Application and system software is created on user dimension.

6 0
2 years ago
If an if- else statement is true, it will include which kinds of results?
Salsk061 [2.6K]

In an if...else statement, if the code in the parenthesis of the if statement is true, the code inside its brackets is executed. But if the statement inside the parenthesis is false, all the code within the else statement's brackets is executed instead.

Of course, the example above isn't very useful in this case because true always evaluates to true. Here's another that's a bit more practical:

#include <stdio.h>

int main(void) {

int n = 2;

if(n == 3) { // comparing n with 3 printf("Statement is True!\n");

}

else { // if the first condition is not true, come to this block of code

printf("Statement is False!\n"); } return 0;

}

Output:

Statement is False!

5 0
3 years ago
Other questions:
  • What device brocasts all data packets to other nodes on a network?
    5·1 answer
  • Very large and very small numbers are easier to write in scientific notation. For example, the number, 0.000000728 would be writ
    7·1 answer
  • Pls help brainliest
    12·1 answer
  • How does the binary numbering system differ from the hexadecimal numbering system?
    14·2 answers
  • What was the first 1.0.1 version of openssl that was not vulnerable to heartbleed?
    5·2 answers
  • Yolanda first breaks down the whole game she needs to program into modules. She then breaks these modules into smaller modules u
    11·1 answer
  • Write a java program to create and display unique three digit number using 1,2,3 and 4 also count how many three digit number ar
    10·1 answer
  • What is the output by the code system.out.print(8-4+2);
    13·1 answer
  • A program that will ring a bell six times is what kind of program?
    11·2 answers
  • Which of these agents of education empowers the other..........
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!